RED LEVEL-CYBERCRIME

Cybercrime is an inelegant term used to cover a whole range of different offenses and activities. Individuals, gangs, businesses and in some cases, government carry out these with the aid of new technology. As the basic idea cybercrime is like computer crime involving the use of computers, either as a tool of the crime or the intended target.

Types

Cybercrimes can take many forms. Evidently, If we take protest movements in some countries, which was a revolution, for example, the Arab Spring in 2010 – 2012. The uprisings emerged in the countries with impacting society by the usage of social media. Drastically, Social media’s role was very effective that it led to a Facebook Revolution.

Another example is moral cybercrime. Unauthorized file-sharing, downloading music & films and other data from the internet with their peer groups without permission from the copyright holders, etc. belong to this category.  

The United States internet crime complaint center has put the annual cost of internet crime based on complaints made to it at just over $485 million for the year of 2013.

Hacking

Hacking is another type of cybercrime. The unauthorized entry into a telecommunications system, network, computer or database considered hacking. On one hand, Hacking was not a crime but was an intellectual game. In the US, in the mid-’90s hacking was only to telephone systems. Specifically, the young curious who are talented, technologically minded and intellectual was into it. These youngsters are phone phreakers.

Famous Hacking

Steve Wozniak the co-founder of Apple Computers is a phone phreaker. He reveals himself as a hacker and explained that hackers have a particular sense of humor. Similarly, Tim Berners-Lee, the man who designed the internet protocol which is the World Wide Web. The authority caught him for hacking and banned from using the university’s computer system. And also Bill Gates, the co-founder of Microsoft, banned from using computers at Computer Center Corporation (now defunct) for exploiting bugs in the operating system.  

Criminal Hacking  

The United Kingdom concluded that hacking is a criminal act. And then the person who carries out the illegal, harmful act faced the prosecution. In the mid-1990s criminals commenced working with hi-tech domains in a more systematic way. In 1995, a Russian called Vladimir Levin hacked the US Citibank accounts. Then arrested for the criminal act.

The Internet & Virus Threat

The age of mass cybercrime or mass cyber vandalism is the era of computers hacking. And users no longer could use their email & surface websites. When the internet was still at its infancy, a computer virus considered a computer worm. Unlike a virus, a worm needed something to latch on to a document or a program.

The Michelangelo virus of 1991 is one of the deeply damaging viruses which affected thousands of computer users. This was an internet worm. After this, the most widespread virus was macro viruses, attached in the Word documents. Once the user received the attachment and when opens it there itself virus starts to run all over.

For example, in 1999 the virus Melissa was huge exploitation on email accounts. It appeared as a word document attachment in the email. The most quickly ran virus was Melissa during that era.

In addition, the Kournikova virus was another, released in 2001. Recipients see an email subject as “Hi, check this” and attachment named “AnnaKournikova” the famous tennis player. The intention to open the email was by giving a picture of a glamorous Russian.

Source: CYBERCRIME & WARFARE BY Peter Warren & Michael Streeter

LEAVE A REPLY

Please enter your comment!
Please enter your name here